RU ITEC411 Chapter 5

12345678910111213141516171819
Across
  1. 3. the use of computer hacking for politically or socially motivated purposes
  2. 5. a cyberattack that uses fake calls to trick people into giving sensitive information
  3. 6. an act that makes it so that gambling businesses cannot knowingly accept bets/wagers from people over the internet
  4. 8. an international organization that allows people to buy services from other countries as long as its legal in their own
  5. 11. Unique physiological or behavioral characteristics that are used to verify the identity of a person
  6. 12. a software used to prevent/delete viruses from a computer
  7. 13. a cyberattack that uses fake texts to trick people into giving sensitive information
  8. 15. a computer worm that targets control systems and was thought to be the cause of the damage to the nuclear program of Iran
  9. 16. people who are considered cybersecurity professionals who use their skills show system vulnerabilities
  10. 18. a security barrier that monitors incoming and outgoing network traffic
  11. 19. a law made to help with national security by creating more government surveillance
Down
  1. 1. a cyberattack that uses fake emails to trick people into giving sensitive information
  2. 2. a type of program designed to prevent/find unwanted spyware programs
  3. 3. a decoy system designed to trap potential attackers
  4. 4. The act of going to a foreign place with libel laws so the person can sue
  5. 7. a cyberattack that uses fake websites to trick people into giving sensitive information
  6. 9. the act of breaking unto digital devices intentionally
  7. 10. a cyberattack that makes a computer resource unavailable to users by overwhelming it with traffic
  8. 14. the illegal acquisition and use of a person's identifying information
  9. 17. a bill passed in the US that fixed the existing computer fraud law